Results 171 to 180 of about 142,210 (279)

Securing of aes based on secure hash algorithm for image steganography

open access: gold, 2022
Kakarla Chaitanya   +3 more
openalex   +2 more sources

Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs. [PDF]

open access: yesSci Rep
Janakiraman S   +5 more
europepmc   +1 more source

Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics

open access: yesiScience
Summary: This article proposes a secure communication enhancement scheme based on face detection and chaotic partition permutation. The scheme uses edge detection technology to detect facial information, which is then used as an encryption object.
Zhiyu Xie   +3 more
doaj  

Research on the application of quantum-secure algorithms in 5G network

open access: yesDianxin kexue
With the widespread application of 5G networks, data transmission speed and capacity have been significantly improved, promoting innovative development in fields such as the Internet of things, autonomous driving, and telemedicine.
WANG Congli   +5 more
doaj  

Home - About - Disclaimer - Privacy